Description
Atomic Alarm Clock 6.3 contains a local privilege escalation vulnerability in its service configuration that allows attackers to execute arbitrary code with SYSTEM privileges. Attackers can exploit the unquoted service path by placing a malicious executable named 'Program.exe' to gain persistent system-level access.
Problem types
Unquoted Search Path or Element
Product status
Credits
boku
References
www.exploit-db.com/exploits/48352 (ExploitDB-48352)
www.drive-software.com (Vendor Homepage)
www.vulncheck.com/...-atomicalarmclock-unquoted-service-path (VulnCheck Advisory: Atomic Alarm Clock x86 6.3 - 'AtomicAlarmClock' Unquoted Service Path)